Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/10/2024, 12:12 UTC

241029-pdnz6swngp 10

02/04/2023, 23:18 UTC

230402-3anrwsbe84 10

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 12:12 UTC

General

  • Target

    158692a7c2bd29a8bda1a166b8a0cf66a0f84d587c696b940de63cb63a848e71.exe

  • Size

    666KB

  • MD5

    79c42acfef4f418e432e9e9b6a31da51

  • SHA1

    bb7537c905b5eedd84951dc2ce2bc11cbe2185ad

  • SHA256

    158692a7c2bd29a8bda1a166b8a0cf66a0f84d587c696b940de63cb63a848e71

  • SHA512

    d851e28e22a4ab6d4e41c6a404a9e16f4dae6d5f409c16a640c382eeb1c108cef01a052bdd9f844a7d00b5ec367f73204517c4946b55e40e997144cf9e738e70

  • SSDEEP

    12288:YMrqy90Jhv0JVYrjHPfQx7mq74n7DdPxCo27rU0/L/wLFk5+IR3SSc:yyANv3QxCW47DdpCZ7rFTwxkwy3nc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158692a7c2bd29a8bda1a166b8a0cf66a0f84d587c696b940de63cb63a848e71.exe
    "C:\Users\Admin\AppData\Local\Temp\158692a7c2bd29a8bda1a166b8a0cf66a0f84d587c696b940de63cb63a848e71.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215760.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215760.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6248.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6248.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1084
          4⤵
          • Program crash
          PID:544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7671.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4176 -ip 4176
    1⤵
      PID:5100

    Network

    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      140.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      140.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      196.249.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      196.249.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      50.23.12.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      50.23.12.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      241.42.69.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.42.69.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      13.86.106.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      13.86.106.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      77.190.18.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      77.190.18.2.in-addr.arpa
      IN PTR
      Response
      77.190.18.2.in-addr.arpa
      IN PTR
      a2-18-190-77deploystaticakamaitechnologiescom
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      14.227.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      14.227.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      tse1.mm.bing.net
      Remote address:
      8.8.8.8:53
      Request
      tse1.mm.bing.net
      IN A
      Response
      tse1.mm.bing.net
      IN CNAME
      mm-mm.bing.net.trafficmanager.net
      mm-mm.bing.net.trafficmanager.net
      IN CNAME
      ax-0001.ax-msedge.net
      ax-0001.ax-msedge.net
      IN A
      150.171.27.10
      ax-0001.ax-msedge.net
      IN A
      150.171.28.10
    • flag-us
      GET
      https://tse1.mm.bing.net/th?id=OADD2.10239360453660_1FJYLRXUGJ1KYC379&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
      Remote address:
      150.171.27.10:443
      Request
      GET /th?id=OADD2.10239360453660_1FJYLRXUGJ1KYC379&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
      host: tse1.mm.bing.net
      accept: */*
      accept-encoding: gzip, deflate, br
      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
      Response
      HTTP/2.0 200
      cache-control: public, max-age=2592000
      content-length: 405350
      content-type: image/jpeg
      x-cache: TCP_HIT
      access-control-allow-origin: *
      access-control-allow-headers: *
      access-control-allow-methods: GET, POST, OPTIONS
      timing-allow-origin: *
      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: B5F88838D79A472582B2BC34A3C57A77 Ref B: LON601060107034 Ref C: 2024-10-29T12:14:51Z
      date: Tue, 29 Oct 2024 12:14:50 GMT
    • flag-us
      GET
      https://tse1.mm.bing.net/th?id=OADD2.10239339388054_102MSIJZMD11N1LFS&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
      Remote address:
      150.171.27.10:443
      Request
      GET /th?id=OADD2.10239339388054_102MSIJZMD11N1LFS&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
      host: tse1.mm.bing.net
      accept: */*
      accept-encoding: gzip, deflate, br
      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
      Response
      HTTP/2.0 200
      cache-control: public, max-age=2592000
      content-length: 634521
      content-type: image/jpeg
      x-cache: TCP_HIT
      access-control-allow-origin: *
      access-control-allow-headers: *
      access-control-allow-methods: GET, POST, OPTIONS
      timing-allow-origin: *
      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 33A7EB1741B94A84B86A2BA37940861F Ref B: LON601060107034 Ref C: 2024-10-29T12:14:51Z
      date: Tue, 29 Oct 2024 12:14:50 GMT
    • flag-us
      GET
      https://tse1.mm.bing.net/th?id=OADD2.10239339388055_1XESFY6X2CFT4STX4&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
      Remote address:
      150.171.27.10:443
      Request
      GET /th?id=OADD2.10239339388055_1XESFY6X2CFT4STX4&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
      host: tse1.mm.bing.net
      accept: */*
      accept-encoding: gzip, deflate, br
      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
      Response
      HTTP/2.0 200
      cache-control: public, max-age=2592000
      content-length: 743602
      content-type: image/jpeg
      x-cache: TCP_HIT
      access-control-allow-origin: *
      access-control-allow-headers: *
      access-control-allow-methods: GET, POST, OPTIONS
      timing-allow-origin: *
      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: D2EAD264C8B94936A7D8C8B5BBA405E3 Ref B: LON601060107034 Ref C: 2024-10-29T12:14:51Z
      date: Tue, 29 Oct 2024 12:14:50 GMT
    • flag-us
      GET
      https://tse1.mm.bing.net/th?id=OADD2.10239360453482_1OGQPWVCF77KWCMMI&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
      Remote address:
      150.171.27.10:443
      Request
      GET /th?id=OADD2.10239360453482_1OGQPWVCF77KWCMMI&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
      host: tse1.mm.bing.net
      accept: */*
      accept-encoding: gzip, deflate, br
      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
      Response
      HTTP/2.0 200
      cache-control: public, max-age=2592000
      content-length: 561868
      content-type: image/jpeg
      x-cache: TCP_HIT
      access-control-allow-origin: *
      access-control-allow-headers: *
      access-control-allow-methods: GET, POST, OPTIONS
      timing-allow-origin: *
      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: BD6D03E9F6424B17964FAFE67DAC65A4 Ref B: LON601060107034 Ref C: 2024-10-29T12:14:51Z
      date: Tue, 29 Oct 2024 12:14:50 GMT
    • flag-us
      DNS
      43.58.199.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      43.58.199.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      10.27.171.150.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      10.27.171.150.in-addr.arpa
      IN PTR
      Response
    • 176.113.115.145:4125
      qu7671.exe
      260 B
      5
    • 176.113.115.145:4125
      qu7671.exe
      260 B
      5
    • 176.113.115.145:4125
      qu7671.exe
      260 B
      5
    • 176.113.115.145:4125
      qu7671.exe
      260 B
      5
    • 150.171.27.10:443
      https://tse1.mm.bing.net/th?id=OADD2.10239360453482_1OGQPWVCF77KWCMMI&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
      tls, http2
      84.9kB
      2.4MB
      1775
      1772

      HTTP Request

      GET https://tse1.mm.bing.net/th?id=OADD2.10239360453660_1FJYLRXUGJ1KYC379&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

      HTTP Request

      GET https://tse1.mm.bing.net/th?id=OADD2.10239339388054_102MSIJZMD11N1LFS&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

      HTTP Request

      GET https://tse1.mm.bing.net/th?id=OADD2.10239339388055_1XESFY6X2CFT4STX4&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

      HTTP Request

      GET https://tse1.mm.bing.net/th?id=OADD2.10239360453482_1OGQPWVCF77KWCMMI&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

      HTTP Response

      200

      HTTP Response

      200

      HTTP Response

      200

      HTTP Response

      200
    • 150.171.27.10:443
      tse1.mm.bing.net
      tls, http2
      1.2kB
      6.9kB
      15
      13
    • 150.171.27.10:443
      tse1.mm.bing.net
      tls, http2
      1.2kB
      6.9kB
      15
      13
    • 150.171.27.10:443
      tse1.mm.bing.net
      tls, http2
      1.2kB
      6.9kB
      15
      13
    • 176.113.115.145:4125
      qu7671.exe
      260 B
      5
    • 176.113.115.145:4125
      qu7671.exe
      156 B
      3
    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    • 8.8.8.8:53
      140.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      140.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      196.249.167.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      196.249.167.52.in-addr.arpa

    • 8.8.8.8:53
      50.23.12.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      50.23.12.20.in-addr.arpa

    • 8.8.8.8:53
      241.42.69.40.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      241.42.69.40.in-addr.arpa

    • 8.8.8.8:53
      13.86.106.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      13.86.106.20.in-addr.arpa

    • 8.8.8.8:53
      77.190.18.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      77.190.18.2.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      14.227.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      14.227.111.52.in-addr.arpa

    • 8.8.8.8:53
      tse1.mm.bing.net
      dns
      62 B
      170 B
      1
      1

      DNS Request

      tse1.mm.bing.net

      DNS Response

      150.171.27.10
      150.171.28.10

    • 8.8.8.8:53
      43.58.199.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      43.58.199.20.in-addr.arpa

    • 8.8.8.8:53
      10.27.171.150.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      10.27.171.150.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215760.exe

      Filesize

      524KB

      MD5

      6755745bb38839fdf65af281bd969f00

      SHA1

      2f30b2583e3d93a8e314fb6b226c5f52b0364908

      SHA256

      09166615f7e43b8a529089d6a4206421a431a7079635574a3aecefc25b316787

      SHA512

      8cf1e61d159c0ddc3621d452275d512d84585115fe15c7d440fefe7980c9b52aadb6a0fd8b106abfb69dac3b4aadb5ea1384c9234f47a80b162f39d3ffa28751

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6248.exe

      Filesize

      294KB

      MD5

      9f4a43f973f56c272b93f3467e932ed0

      SHA1

      d0e6057849e49e23196cf7f2fa09fb84862e8b8e

      SHA256

      5c0129a963a3b4ff5857aff4ed1b732eb0cab3d9448049cca2bd2afad4ddee1f

      SHA512

      eda601937fc2ff739fbeaa8219c0b9077ec73bdc2ca698116ac5a46e127167aadbd025e9ce8fe83c47078f33caf39774caca91a6669ac1e0750add650531f465

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7671.exe

      Filesize

      352KB

      MD5

      618f6727e66ea87de6664ed6a989f81b

      SHA1

      e746378f2de3712225f2845834317d093085708f

      SHA256

      7880157d41d14177ee0e91874d91de189acac98ffbd0c8fb05ca1919ae233247

      SHA512

      93b0ca94f646b0650245e980a46d7b3aff643b4221150ecfdc9ed95471db445a6f0f503f106461b39ef83f607e665833c8ac24cf29063b8f6a0a0e807554b27c

    • memory/1268-76-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-80-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-970-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

      Filesize

      1.0MB

    • memory/1268-969-0x0000000005440000-0x0000000005A58000-memory.dmp

      Filesize

      6.1MB

    • memory/1268-63-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-64-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-82-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-68-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-70-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-74-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-972-0x0000000005C40000-0x0000000005C7C000-memory.dmp

      Filesize

      240KB

    • memory/1268-973-0x0000000005D90000-0x0000000005DDC000-memory.dmp

      Filesize

      304KB

    • memory/1268-79-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-971-0x0000000005C20000-0x0000000005C32000-memory.dmp

      Filesize

      72KB

    • memory/1268-84-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-86-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-88-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-90-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-92-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-94-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-96-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-72-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-66-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1268-62-0x00000000053B0000-0x00000000053F4000-memory.dmp

      Filesize

      272KB

    • memory/1268-61-0x00000000029E0000-0x0000000002A26000-memory.dmp

      Filesize

      280KB

    • memory/4176-41-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4176-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4176-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4176-51-0x0000000000960000-0x000000000098D000-memory.dmp

      Filesize

      180KB

    • memory/4176-50-0x0000000000A10000-0x0000000000B10000-memory.dmp

      Filesize

      1024KB

    • memory/4176-22-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-23-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-25-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-27-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-29-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-31-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-33-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-35-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-37-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-39-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-43-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-45-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-47-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-49-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/4176-21-0x0000000004ED0000-0x0000000004EE8000-memory.dmp

      Filesize

      96KB

    • memory/4176-20-0x0000000004F70000-0x0000000005514000-memory.dmp

      Filesize

      5.6MB

    • memory/4176-19-0x00000000029D0000-0x00000000029EA000-memory.dmp

      Filesize

      104KB

    • memory/4176-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4176-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4176-16-0x0000000000960000-0x000000000098D000-memory.dmp

      Filesize

      180KB

    • memory/4176-15-0x0000000000A10000-0x0000000000B10000-memory.dmp

      Filesize

      1024KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.